Vous êtes sur la page 1sur 6

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.

com Volume 1, Issue 3, September October 2012 ISSN 2278-6856

Analysis of Avalanche Effect in Plaintext of DES using Binary Codes


Akash Kumar Mandal1, Mrs. Archana Tiwari2
1 Department of Electronics and Telecommunication Chhatrapati Shivaji Institute of Technology,,Durg,Chhattisgarh,India 2 Department of Electronics and Instrumentation Chhatrapati Shivaji Institute of Technology,,Durg,Chhattisgarh,India

Abstract:With the fast progression of digital data exchange


in electronic way, information security is becoming more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. These algorithms consume a significant amount of computing resources such as CPU time, memory and computation time. In this paper a most widely used symmetric encryption technique i.e. Data Encryption Standard (DES) have been implemented using MATLAB software. After the implementation, this encryption technique was analyzed based on a parameter called Avalanche effect, using binary codes. Avalanche Effect due to one bit variation in plaintext keeping the key constant after mapping it in a binary code, Experimental results shows that the proposed algorithm exhibit significant high Avalanche Effect which improves the level of the security. Keywords: Data Encryption Standard (DES), Encryption, Decryption, Ciphertext, Secret key, Avalanche Effect.

and understood is called plaintext or clear text. The method of scrambling the plaintext in such a way that hides its substance is called encryption. Encrypting plaintext makes the information in unreadable information called cipher text. The process of converting cipher text to its original information is called decryption. The complexity of encryption process depends on algorithm used for encryption, software used and the key used in algorithm to encrypt or decrypt the data. Security of any encryption system depends on the security principle proposed by Kirchhoff. According to the Kirchhoff, the security of the encryption system should depend on the secrecy of the encryption /decryption key rather than encryption algorithm. [3] After extensive survey of various research papers it is observed that an encryption algorithm should produce significant change in the encrypted message when a small change is made in original message.

1. INTRODUCTION
Transmission of sensitive digital data over the communication channel has emphasized the need for fast and secure digital communication networks to achieve the requirements for integrity, secrecy and non reproduction of transmitted information. Cryptography provides a method for securing and authenticating the transmission of information across insecure communication channels. It enables us to store sensitive information or transmit it over insecure communication networks so that unauthorized persons cannot read it. [1] Cryptography is an indispensable tool for protecting sensitive information in computer systems. Cryptography makes the message unintelligible to outside the world by various transformations. Data Cryptography is method of scrambling the content of digital data like text, image, audio and video to make it unreadable or unintelligible for others during transmission. The main goal of cryptography is to keep the data secure from unauthorized access [2]. Data containing information that can be read Volume 1, Issue 3, September October 2012

Figure.1 Overview of the field of cryptography

In research papers [8] and [9] authors analyzed various cryptographic algorithms using a parameter called Avalanche Effect. In this paper we proposed an enhancement in DES algorithm using binary codes. This proposed algorithm is expected to provide significant high Avalanche Effect.

2. CRYPTOGRAPHIC ALGORITHMS
Depending upon the number of keys used, cryptographic algorithms can be classified as asymmetric algorithms (public key) and symmetric algorithms (secret key). In Page 166

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 1, Issue 3, September October 2012 ISSN 2278-6856
Symmetric keys encryption or secret key encryption identical key is used by sender and receiver. Data Encryption Standard (DES), 3DES, and Advanced Encryption Standard (AES) are the example of Symmetric key encryption algorithms. In asymmetric keys encryption two different keys (public and private keys) are used for encryption and decryption. Public key is used for encryption and private key is used for decryption Rivest-Shamir-Adelman (RSA) and Elliptic Curve Cryptosystem (ECC) are the example of asymmetric key algorithms.[4]A symmetric cryptosystem has five ingredients: 2.1 Plaintext This is the original data or message to be transmitted that fed into the algorithm as input. 2.2 Encryption Algorithm The algorithm performs various transformations and substitutions on the plaintext. 2.3 Secret key This is another input to the algorithm and the value of secret key is independent of the plaintext. Depending on the specific key the algorithm will produce a different output. 2.4 Encryption Algorithm This is the scrambled or encrypted message produced as output. This output depends on the plaintext and the secret key.[5] 2.5 Decryption Algorithm This is essentially the encryption algorithm operate in reverse. It takes the ciphertext and the secret key as input and produces the original plaintext as output. Data can be recovered from cipher only by using exactly the same key used to encipher it. Unauthorized recipients of the cipher who know the algorithm but do not have the correct key cannot derive the original data algorithmically. However, it may be feasible to determine the key by a brute force Exhaustion attack Also, anyone who does have the key and the algorithm can easily decipher the cipher and obtain the original data. A standard algorithm based on a secure key thus provides a basis for

Figure 2 DES (Data Encryption Standard) process Input plaintext Encryption key

Binary Codes

Binary Codes

3. DES ALGORITHM
The Data Encryption Standard (DES) designed to encrypt and decrypt blocks of data consisting of 64 bits under control of a 64-bit key. Encrypting data converts it to an unreadable cryptorgaphic security of the data depends on the security provided for the key used to encipher and decipher the data. [4]form known as cipher. Decrypting cipher converts the data back to its original form known as plaintext. Both encryption and decryption operations are performed using a binary number called a key. A DES key is a 64 bit binary number of which 56 bits are randomly generated and used directly by the algorithm. The remaining 8 bits, which are not used by the algorithm while encryption, can be used for error detection. The 8 error detecting bits are set to make the parity of each 8-bit byte of the key odd, i.e., there is an odd number of "1"s in each 8-bit byte. Authorized users of encrypted computer data must have the key that was used to encipher the data in order to decrypt it. The encryption algorithms specified in this standard are commonly known among those using the standard. The Volume 1, Issue 3, September October 2012 Encryption Algorithm (DES)

Ciphertext Figure 3 DES process when input plaintext and input key are mapped in binary code exchanging encrypted computer data by issuing the key used to encipher it to those authorized to have the data. Data that is considered sensitive by the responsible authority, data that has a high value, or data that represents a high value should be cryptographically protected if it is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. [6]

Page 167

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 1, Issue 3, September October 2012 ISSN 2278-6856 4. METHODOLOGY
We have implemented Data Encryption Standard (DES) algorithm in MATLAB 7.0 software. This encryption technique takes 64 bit data block as input and encrypt this data block using 64 bit key. Figure 3 shows the block diagram of algorithm that we have used for our experiments. In our experiments we have mapped input plaintext and encryption key into various binary codes before providing the input to the DES algorithm. If there are n quantities in a group, a code of b binary digits or bits may represent all quantities unequally. [7] b n 4.1 Natural BCD Code (8421 code) Natural BCD code or 8421 code is used whenever decimal information is transferred in or out of a digital system. In this code straight assignment of binary equivalent is used with weights. 4.2 2421 Code These are weighted ,reflected and self-complementing codes, In 2421 codes if a number has more than one representation then choose the code that uses the lower binary weights (for number 0-4 only) 4.3 5421 Code These are weighted code with weight 5-4-2-1. In 5421 codes if a number has more than one representation then choose the code that uses the lower binary weights. 4.4 7421 Code These are weighted code with weight 7-4-2-1. For decimal number 7 choose code with least number of 1s. 4.5 5311/5211 Code These are weighted code with weight 5-3-3-1. In these codes if a number has more than one representation then choose the code with least number of 1s and use first the 1 from extreme right that uses the lower binary weights. 4.6 Gray Code It is also known as reflected and unit distance code which is a reflected mirror image. Unit distance exhibit only a single bit change from one code to the next. It is also an unweighted and not an arithmetic code. 4.7 3321/4221 Code These are weighted code with weight 3-3-2-1/4-2-2-1. the plaintext or the key should produce a significant change in the cipher text.

AvalancheEffect

Numberof flippedbitsin cipheredtext Numberof bits in cipheredtext

However, a change in one bit of the plaintext or one bit of the key should produce a change in many bits of the cipher texts. This property is known as Avalanche Effect [8, 9].Avalanche Effect can be calculated by using above equation. The performance of proposed algorithm is evaluated using Avalanche Effect due to one bit variation in plaintext(before being mapped in various binary codes) keeping encryption key constant in a binary code . Avalanche Effect is calculated for various combination of plaintext and encryption key by mapping them in various binary codes. Table 1: Data code is fixed in 2421 code and key varied
Data in 2421 2421 3321 4221 5211 5311 5421 7421 GRAY 8421 Key : '3B3898371520F75E' Data:'ABCDEF01 Data:'ABCDEF01 23456789' 27456789' 'C79E3C7 '2A8EA04C A3E1763CF' 65B41C60' 'B466EBF3 '778AD655 64DB1F96' 703CF8A7' '194DBB9E 'AAADCE33 9849A99D' FE7F47B7' 06A844B0 '0CF914C3 3889B6DD' 1991F112' '19324425 'ED577EB1 F522CD27' B746B3F6' 'E9CCABBF '7FFC85C3 AB908BD4' 72360A1A' 'B009AA52 '4441B255 8D569E46' 993F9517' 'F711F8F9 '03185F61 ED42BAEB' B8746736' '9AE993DC '0C10DF1A 123AB963' A3137F98' Avalanche Effect 37 35 35 26 31 31 24 35 35

Table 2: Data code is fixed in 3321 code and key varied


Data in 3321 2421 3321 4221 5211 5311 5421 7421 GRAY 8421 Key : '3B3898371520F75E' Data:'ABCDEF01 23456789' '652B8E48 7B6CDBCE' 'CB680809 5F84B565' '24EF7640 3736F683' '3F185FBF 6A755D53' '7A7BA88D 8F3A90F7' '8810A024 17FA2897' 'C704C1E9 1A7E781D' '4F63A1D2 752949BC' 'B7B7D97B E0F284A3' Data:'ABCDEF01 27456789' '294BB964 1F5F0368' '9E491AA1 47C57E49' 'EE6C3558 7527CA87' '0A9AF76F 9BB0E34A' 'B35CD18E C0C0EDD4' 'EBC5F8BD 8677C366' 'D75E1AD5 9B1082ED' '2DD55D83 E0ED740E' '68D8052D 69799089' Avalanche Effect 28 23 21 30 35 34 32 33 34

5. EVALUATON PARAMETER
Each of the encryption technique has its own strong and weak points. In order to apply an appropriate technique in a particular application we are required to know these strengths and weakness. Therefore the analysis of these techniques is critically necessary. A desirable property of any encryption algorithm is that a small change in either Volume 1, Issue 3, September October 2012

Page 168

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 1, Issue 3, September October 2012 ISSN 2278-6856
Table 3 : Data code is fixed in 4221 code and key varied
Data in 4221 2421 3321 4221 5211 5311 5421 7421 GRAY 8421 Key : '3B3898371520F75E' Data:'ABCDEF01 23456789' '8B5B700C 691E1058' 'A144F374 DA022507' 'B957F5F4 82D45CEF' '64A2C1D2 DE1D3305' '1F0FDC21 CDFA29C9' '9AC6B870 4A6678EC' 'F4B1C37B 50E1B589' '92931295 0EEB83BE' '1F662D0D 6B46637E' Data:'ABCDEF01 27456789' '894E1AEC BD04568D' 'D0A60E85 3F47C3B4' 'B87C3338 B128D8D5' '1EFC9935 0AAB90B8' '1A42DA38 5EE5ABA8' '54B93B6B 62F10F4C' '44C50BD7 2B691BC6' '71FF1693 EA3BC103' '2C31111E 56C69688' Avalanche Effect 26 38 29 38 25 34 32 27 34

Table 6: Data code is fixed in 5421 code and key varied


Data in 5421 2421 3321 4221 5211 5311 5421 7421 GRAY 8421 Key : '3B3898371520F75E' Data:'ABCDEF01 23456789' '1257BE96 584FB519' '198FFB39 937E2A4E' 'FFF0916F 34676E67' '5C7D7ACC 75E75E63' '0C46CAFD 5B6662C6' 'A0290F6B C8B80958' 'FE072BB2 460EBE63' 'C524D34C B28AEE6A' 'FE4162F3 9FA9CB93' Data:'ABCDEF01 27456789' 'E9A6E23A B3FDC969' '269F50AD 108795B9' '0A389293 E366880B' '5226D440 811454FF' '77FB5147 2C8D3A6B' '30073919 E2130A8B' '3ECF2987 33B7D0A9' '825A1CEA CD0615D5' '76E1750A D505CBF6' Avalanche Effect 38 38 33 33 42 29 29 44 25

Table 4: Data code is fixed in 5211 code and key varied


Data in 5211 2421 3321 4221 5211 5311 5421 7421 GRAY 8421 Key : '3B3898371520F75E' Data:'ABCDEF01 Data:'ABCDEF01 23456789' 27456789' '5A03A883 '9F178264 636691ED' 36E12D59' '0626106C '657F95BA 4D70D77E' F8B39712' '49A36E42 '7D28BBA7 2A0AB541' 9CC3502E' 'FF3F1829 '606887B4 C25C624B' 98D07A7A' 'B6B2B32D 'DD9011ED 84A532B1' 34B9156B' 'FCACF8A8 '7D2D0376 C9190426' E6E95E0F' '698879F4 'E17EA595 012FA33C' 430B9385' '08FFED9B '000A83E9 E65CFA72' 785D4423' '628E24E3 '4FD31484 836C514C' E523AAF4' Avalanche Effect 32

Table 7: Data code is fixed in 7421 code and key varied


Data in 7421 2421 Key : '3b3898371520f75e' Data:'ABCDEF01 23456789' '6E71BE89 C69A9E91' 'A4EEC70E 309CD030' 'B53E4DDD D3F2CCEF' 'F99DE434 E34A0978' 'F380A3AB F1803EA4' 'A3A3A7B4 30E95256' '3CEB3C55 CB15E1D0' 'A9585152 2B048EB5' 'BE4E60D5 31E8F758' Data:'ABCDEF01 27456789' '59812BF9 8C465E56' '7C8BA5B5 0CCC2A48' 'B820F613 7E199153' 'D171EDD4 C2EEE4FA' '99D0796F 3DE20FBB' '098FA674 01889CCA' '4520A9BD 0A181228' '44ECD251 56709934' '6EA1FA47 A2A81565' Avalanche Effect 31 33 39 25 29 25 35 31 31

30 3321 37 4221 34 5211 27 5311 33 5421 27 7421 31 GRAY 36 8421

Table 5: Data code is fixed in 5311 code and key varied


Data in 5311 2421 3321 4221 5211 5311 5421 7421 GRAY 8421 Key : '3B3898371520F75E' Data:'ABCDEF01 23456789' 'EBEA650A 7AF76C6A' 'F7C35243 B5B430D9' 'BC97CB1E F1AA793C' 'F5FD9950 A58F9625' '87A9D7F8 8039D29A' 'DC0EA148 3B7BFAF9' '22F18389 21C903B5' '45FE6645 04AC7392' 'E1AB8427 DAA84878' Data:'ABCDEF01 27456789' '2F3EB840 FF8C714A' '31861342 AFCFAA01' '14DD040D BFECC01E' 'B0ADB3DE C20918A4' '5EDDEA69 02AA2480' 'BDA40C2C 94FF242C' 'BBB2D53B 60358BC8' '03E14029 DA8B3323' '849CBFCC 6EBAF394' Avalanche Effect 30

Table 8: Data code is fixed in Gray code and key varied


Data in GRAY CODE 2421 Key : '3B3898371520F75E' Data:'ABCDEF01 23456789' '0FFDC969 A15579D6' 'DE3421D9 F1914AFA' 'AA751B0F 4B793D34' 'DFAA06E8 6358D5A2' '0C09060A E712B990' 'BD9D1869 1E3E4079' '7BA6CB456 344DC2A' 'B86DD181 396BF433' '259BFC32 3B640C7A' Data:'ABCDEF01 27456789' '5B09DD97 D24C60A3' '8A1A69A7 C1E6821A' '47A225FE F7814848' '2595DA13 61073C2D' '89BAAA24 E9951723' '7B7F2D04 36674668' '1719D41E 937C9F7F' '38D1CE1B 658D3BFB' 'D3380DF5 4FBCDAE0' Avalanche Effect 33 29 42 41 33 27 35 33 37

27 3321 29 4221 26 5211 32 5311 34 5421 31 7421 30 GRAY 37 8421

Volume 1, Issue 3, September October 2012

Page 169

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 1, Issue 3, September October 2012 ISSN 2278-6856
Table 9: Data code is fixed in 8421 code and key varied
Data in 8421 2421 3321 4221 5211 5311 5421 7421 GRAY 8421 Key : '3B3898371520F75E' Data:'ABCDEF01 Data:'ABCDEF01 23456789' 27456789' '51D5C358 '03241206 87F225E0' D5267CB6' '6ACE01AB 'B9F3503E 18E3BEED' 7E76ACD8' '893371A0 'F083D019 F35E9D42' 1F904366' 'E26D679B '94384BFE F2125563' 31820A7D' '30FB4B88 '80C37F91 3305A7BF' 586D4D14' 'BB0F578DE '4B2773FE ECDB8E7' 67DC2A9C' 'DE361067 '6625F098 6242E21F' 86BEA3C3' '7C19449A '9B80FD64 55C9A64B' 17BA3ECD' '7D0DFC6A '02E82396 BA2C587D' 14B9CFB1' Avalanche Effect 32 31 34 32 30 27 35 35 43

code and encryption key is varied in different binary codes. By analyzing table 10 it is clear that Avalanche Effect is maximum (i.e. 44 bits out of 64 bits) when key remain fixed in Gray code and 1 bit is varied in data when it is mapped in 3321 binary code. Figure 4 shows analysis of Avalanche Effect Due to one bit change in plaintext when encryption key is constant .it is clear from figure that maximum Avalanche Effect can be obtained when encryption key is mapped in Gray code and data is mapped in 3321 binary code. Therefore, if one desires a good avalanche effect; DES is a good option.

7. CONCLUSION
In this paper a slight modification in DES algorithm is proposed. In the proposed algorithm, we have mapped input plaintext and encryption key into various binary codes, instead of giving plaintext directly to the DES algorithm. This leads significant increase in Avalanche Effect of encryption algorithm. We got maximum avalanche effect of 44/64, when key is mapped in Gray code and Data is mapped in 5421.But due to invertible property of 5421 code some of the code may be duplicated. Therefore this mapping is not suggested as some code (duplicated code) may be decoded wrongly. Our future work will include experiments on image and focus will be to improve security level.

Table 10: Analysis of Avalanche Effect Due to one bit change in plaintext

8. ACKNOWLEDGMENT
This paper is a part of our M.E. project. We are grateful to our project guide for valuable suggestions, comments and contribution.

REFERENCES
Figure 4 Analysis of Avalanche Effect Due to one bit change in plaintext 1. P.Karthigaikumar, Soumiya RasheedSimulation of Image Encryption using AES Algorithm IJCA Special Issue on Computational Science - New Dimensions & Perspectives NCCSE, 2011 Diaa Salama Abd Elminaam, Hatem Mohamad Abdual Kader,Mohiy Mohamed Hadhoud, Evalution the Performance of Symmetric Encryption Algorithms, international journal of network security vol.10,No.3,pp,216-222,May 2010. Nidhi Singhal, J.P.S.Raina Comparative Analysis of AES and RC4 Algorithms for Better Utilization International Journal of Computer Trends and Technology- July to Aug Issue 2011. Akash Kumar Mandal, Chandra Parakash, Mrs. Archana Tiwari Performance Evaluation of Cryptographic Algorithms:DES and AES IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS), March 2012 William Stalling Cryptography and network security Pearson education,2nd Edition. Page 170

6. EXPERIMENTAL RESULTS AND ANALYSIS


Analysis for Data Encryption Standard (DES) algorithm is shown in following tables. The original data to be encrypted and the encryption key used for encryption are mapped into various binary codes. Table 1 shows the Avalanche Effect when input plaintext kept fixed in a 2421code and encryption key is varied in different codes. Avalanche Effect is calculated by counting the number of flipped bits in the ciphertext due to one bit change in the original plaintext before being mapped in binary code while key remains constant throughout the experiment. Similarly from table 2 to table 9 shows the Avalanche Effect in different conditions when input plaintext kept fixed in a particular binary Volume 1, Issue 3, September October 2012

2.

3.

4.

5.

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 1, Issue 3, September October 2012 ISSN 2278-6856
6. Data Encryption Standard Announced by the Federal Information Processing Standards Publication 46-3, 1999 October 25 A.Anand Kumar ,Fundamentals of Digital Circuits, PHI Learning Pvt.Ltd.,2nd Edition Himani Agrawal and Monisha Sharma Implementation and analysis of various symmetric cryptosystems Indian Journal of Science and Technology Vol. 3 No. 12 (Dec 2010) Sriram Ramanujam,Marimutha Karuppiah Designing an algorithm with high avalanche effect International Journal of Computer Science and Network Security, VOL.11 No.1, January 2011

7. 8.

9.

10. A.Nadeem, "A performance comparison of data encryption algorithms", IEEE information and communication technologies, pp.84-89, 2006.Bn 11. NeetuSettia.Cryptanalysis of modern Cryptography Algorithms. International Journal of Computer Science and Technology. December 2010. 12. Diaasalama, Abdul kader, Mohiy Hadhoud, Studying the Effect of Most Common Encryption Algorithms, International Arab Journal of etechnology, Vol 2, No.1, January 2011. 13. Ruangchaijatupon,P.Krishnamurthy,Encryption and power consumption in wireless LANs-n, The Third IEEE workshop on wireless LANS, pp. 148-152, Newton, Massachusetts, sep. 27-28, 2001.

Akash Kumar Mandal received his B.E degree in Electronics and Telecommunication from Pt. Ravi Shankar Shukla University, Raipur, in 2007 and pursuing his post graduation from Swami Vivekananda Technical University, Bhilai in Communication Engineering. His areas of interest Information Security and Cryptography. He is a member of Indian Society for Technical Education (ISTE) and The Institution of Electronics and Telecommunication Engineers (IETE). Prof. Archana Tiwari received her B.E degree in Electronics and Telecommunication from Amravati in 1994 and completed her post graduation from GEC Jabalpur in 2005. She is pursuing her PhD from Swami Vivekananda Technical University, Bhilai. She has to her credit, more than 20 papers in various International and National Journals and Conferences. With more than 16 years of teaching and research experience .She is currently serving as Associate professor & head in the department of Electronics and Instrumentation, Chhatrapati Shivaji Institute of Technology, Durg. Her areas of interest include image processing, information security and digital watermarking. She is a life member of Indian Society for Technical Education (ISTE) and Institution of Electronics and Telecommunications Engineers (IETE).. She is member of IEEE also.

Volume 1, Issue 3, September October 2012

Page 171

Vous aimerez peut-être aussi